Sciweavers

3515 search results - page 639 / 703
» Resource usage analysis
Sort
View
120
Voted
TC
2008
15 years 2 months ago
High-Performance Mixed-Precision Linear Solver for FPGAs
Compared to higher-precision data formats, lower-precision data formats result in higher performance for computationally intensive applications on FPGAs because of their lower res...
Junqing Sun, Gregory D. Peterson, Olaf O. Storaasl...
TIFS
2008
208views more  TIFS 2008»
15 years 2 months ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros
JCM
2007
87views more  JCM 2007»
15 years 2 months ago
Optimization of Radio Measurements Exploitation in Wireless Mobile Networks
— Radio measurements play a crucial role in mobile wireless networks as they are input of Radio Resource Management (RRM) mechanisms, needed to assess mobile network reliability ...
Afef Ben Hadj Alaya-Feki, Alain Le Cornec, Eric Mo...
TOG
2008
114views more  TOG 2008»
15 years 2 months ago
Automatic generation of tourist maps
Tourist maps are essential resources for visitors to an unfamiliar city because they visually highlight landmarks and other points of interest. Yet, hand-designed maps are static ...
Floraine Grabler, Maneesh Agrawala, Robert W. Sumn...
JNCA
2007
75views more  JNCA 2007»
15 years 2 months ago
Stateful DDoS attacks and targeted filtering
The goal of a DDoS (distributed denial of service) attack is to completely tie up certain resources so that legitimate users are not able to access a service. It has long been an ...
Shigang Chen, Yong Tang, Wenliang Du